• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

ANNUAL DOD CYBER AWARENESS

Class notes Jan 8, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

ANNUAL DOD CYBER AWARENESS

CHALLENGE EXAM FLASHCARDS

EXAM PREPARATION GUIDE | 93 ITEMS

Q:Which of the following attacks target high ranking officials and executives?

Whaling

Q:Using webmail may bypass built in security features.

TRUE

Q:What should you do to protect yourself while on social networks?

Validate all friend requests through another source before confirming them Q:What actions should you take prior to leaving the work environment and going to lunch?All of the above Q:If classified information were released, which classification level would result in "Exceptionally grave damage to national security"?Top Secret Q:Which of the following is NOT a security best practice when saving cookies to a hard drive?Looking for "https" in the URL. All https sites are legitimate.

Q:Which of the following is NOT sensitive information?

Unclassified information cleared for public release

Q:What can you do to prevent spillage?

all of the above

Q:What can you do to protect yourself against phishing?

All of the above

Q:What should be done to protect against insider threats?

Report any suspicious behavior

Q:What should be done to sensitive data on laptops and other mobile computing

devices?Encrypt the sensitive data

Q:Which is NOT a method of protecting classified data?

Assuming open storage is always authorized in a secure facility

Q:It is getting late on Friday. You are reviewing your employees annual self

evaluation. Your comments are due on Monday. You can email your employees information to yourself so you can work on it this weekend and go home now.Which method would be the BEST way to send this information?Use the government email system so you can encrypt the information and open the email on your government issued laptop

Q:Which of the following is NOT a potential insider threat?

Member of a religion or faith

Q:Which of the following is an example of malicious code?

Trojan horses

Q:Should you always label your removable media?

Yes

Q:A medium secure password has at least 15 characters and one of the following.

Special character Q:You check your bank statement and see several debits you did not authorize. You believe that you are a victim of identity theft. Which of the following should you do immediately?Monitor credit card statements for unauthorized purchases Q:Bob, a coworker, has been going through a divorce, has financial difficulties and is displaying hostile behavior. How many potential insider threat indicators is Bob displaying?3

Q:Which of the following definitions is true about disclosure of confidential

information?Damage to national security

Q:When leaving your work area, what is the first thing you should do?

Remove your CAC/PIV Q:It is permissible to release unclassified information to the public prior to being cleared.False

Q:A coworker has left an unknown CD on your desk. What should you do?

Put the CD in the trash Q:The CAC/PIV is a controlled item and contains certificates for: All of the above

Q:The use of webmail is

is only allowed if the organization permits it

Q:Which of the following best describes wireless technology?

It is inherently not a secure technology

Q:Which is NOT a telework guideline?

Taking classified documents from your workspace

Q:Which of the following is a good practice to avoid email viruses?

Delete email from senders you do not know

Q:UNCLASSIFIED is a designation to mark information that does not have

potential to damage national security.

TRUE Q:What type of security is "part of your responsibility" and "placed above all else?" Physical

Q:Spear Phishing attacks commonly attempt to impersonate email from trusted

entities. What security device is used in email to verify the identity of sender?Digital Signatures

Q:ActiveX is a type of this?

Mobile code

Q:What is considered ethical use of the Government email system?

Distributing Company newsletter Q:PII, PHI, and financial information is classified as what type of information?Sensitive

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

ANNUAL DOD CYBER AWARENESS CHALLENGE EXAM FLASHCARDS EXAM PREPARATION GUIDE | 93 ITEMS Q:Which of the following attacks target high ranking officials and executives? Whaling Q:Using webmail may byp...

UNLOCK ACCESS $11.99